TECHNOLOGIES FOR MODIFYING A FIRST CRYPTOGRAPHIC CIPHER WITH OPERATIONS OF A SECOND CRYPTOGRAPHIC CIPHER
First Claim
1. A method of executing a modified cryptographic cipher, comprising, with a processor:
- executing a portion of operations of a first cryptographic cipher to produce a first representation of GF(2)8, REP1, wherein REP1 contains first data and is suitable for use in at least one operation of said first cryptographic cipher;
transforming REP1 to a second representation of GF(2)8, REP2, wherein REP2 contains said first data and is suitable for use in at least one operation of a second cryptographic cipher;
performing at least one isolated operation of said second cryptographic cipher using at least a portion of said first data in REP2 to produce a third representation of GF(2)8, REP3, wherein REP3 contains second data that is the output of said at least one isolated operation on said first data; and
transforming REP3 to a fourth representation of GF(2)8, REP4, wherein REP4 contains said second data and is suitable for use in at least one additional operation of the first cryptographic cipher.
1 Assignment
0 Petitions
Accused Products
Abstract
Generally, the present disclosure provides technology modifying a first cryptographic cipher with one or more operations of a second cryptographic cipher. In some embodiments the technology leverages a mathematical relationship between representations of data used in the first and second ciphers to enable the substitution of one or more operations of the first cipher with one or more operations of the second cipher. The resulting modified cipher may in some instances exhibit improved performance and or security, relative to the unmodified first cipher. Methods, computer readable media, and apparatus including or utilizing the technologies are also described.
-
Citations
24 Claims
-
1. A method of executing a modified cryptographic cipher, comprising, with a processor:
-
executing a portion of operations of a first cryptographic cipher to produce a first representation of GF(2)8, REP1, wherein REP1 contains first data and is suitable for use in at least one operation of said first cryptographic cipher; transforming REP1 to a second representation of GF(2)8, REP2, wherein REP2 contains said first data and is suitable for use in at least one operation of a second cryptographic cipher; performing at least one isolated operation of said second cryptographic cipher using at least a portion of said first data in REP2 to produce a third representation of GF(2)8, REP3, wherein REP3 contains second data that is the output of said at least one isolated operation on said first data; and transforming REP3 to a fourth representation of GF(2)8, REP4, wherein REP4 contains said second data and is suitable for use in at least one additional operation of the first cryptographic cipher. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. At least one computer readable medium comprising computer readable instructions which when executed by a processor cause the processor to perform the following operations comprising:
-
execute a portion of operations of a first cryptographic cipher to produce a first representation of GF(2)8, REP1, wherein REP1 contains first data and is suitable for use in at least one operation of said first cryptographic cipher; transform REP1 to a second representation of GF(2)8, REP2, REP2 containing said first data and being suitable for use in at least one operation of a second cryptographic cipher; perform at least one cryptographic operation of said second cryptographic cipher using at least a portion of said first data in REP2 to produce a third representation of GF(2)8, REP3, REP3 containing second data that is the output of said at least one cryptographic operation of said second cryptographic cipher; and transform REP3 to a fourth representation of GF(2)8, REP4, wherein REP4 contains said second data and is suitable for use in at least one additional operation of the first cryptographic cipher. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus, comprising:
-
a processor; and a memory having a cipher operations module stored thereon, the cipher operations module comprising computer readable COM instructions for a modified cryptographic cipher on the processor, wherein said COM instructions when executed by said processor cause said processor to; execute a portion of operations of a first cryptographic cipher to produce a first representation of GF(2)8, REP1, wherein REP1 contains first data and is suitable for use in at least one operation of said first cryptographic cipher; transform REP1 to a second representation of GF(2)8, REP2, REP2 containing said first data and being suitable for use in at least one operation of a second cryptographic cipher; perform at least one cryptographic operation of said second cryptographic cipher using at least a portion of said first data in REP2 to produce a third representation of GF(2)8, REP3, wherein REP3 contains second data that is the output of said at least one cryptographic operation of said second cryptographic cipher; and transform REP3 to a fourth representation of GF(2)8, REP4, wherein REP4 contains said second data and is suitable for use in at least one additional operation of the first cryptographic cipher. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification